Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 08:44

General

  • Target

    2024-03-14_a968bdc3832a455255d7408206d9a258_cryptolocker.exe

  • Size

    109KB

  • MD5

    a968bdc3832a455255d7408206d9a258

  • SHA1

    511c88df45002bd4b75faf1a41d39bcc16015b05

  • SHA256

    eb4a76ca7812f0ea21522020deddb860643342372d378c6cbcb78d1b4618d0d2

  • SHA512

    f100f6c243fb0b4937f0fab2327ded0fdc4e9c3e1a2f149fdf043c61472f70a17ca783b498d48ba9ed49d528cd456836a5ef6c9c96d81a25789a293b59ecef50

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksgEne9:1nK6a+qdOOtEvwDpjy

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_a968bdc3832a455255d7408206d9a258_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_a968bdc3832a455255d7408206d9a258_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    109KB

    MD5

    d35675ecb2704a55de42f351b139fc22

    SHA1

    baec909fc5e342708b9bda83ef5452630e483cac

    SHA256

    c3aecd255d92c53ab75a9245eca19e45b8de07528b1755697c86f00cd9c0825d

    SHA512

    31273ac19f735da3cd2f75eff021115d420c0a2a9125cc7f011319ac5d9bdb08a30fc8e5f80f4aaccf858311c1c06617c6e10eaf3b6708283ed7ca696d0b3ff2

  • memory/2176-0-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2176-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/2176-2-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/2176-3-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/2176-17-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/3584-19-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/3584-21-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3584-26-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB